2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) 2022
DOI: 10.1109/cscwd54268.2022.9776097
|View full text |Cite
|
Sign up to set email alerts
|

GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Against DDoS attacks, a graph classification approach is proposed by Li et al [74]. In this work, the presented GraphDDoS model aims to detect both low-rate and high-rate DDoS attacks by considering the relationship of packets from a single flow and the relationship between flows.…”
Section: ) Network Intrusion Detection With Flow Graphsmentioning
confidence: 99%
“…Against DDoS attacks, a graph classification approach is proposed by Li et al [74]. In this work, the presented GraphDDoS model aims to detect both low-rate and high-rate DDoS attacks by considering the relationship of packets from a single flow and the relationship between flows.…”
Section: ) Network Intrusion Detection With Flow Graphsmentioning
confidence: 99%
“…A RNN is used at node-level to encode type-specific features based on the attributes and the text content. To capture long-range relations, the authors used the Topology Adaptive Graph Convolutional Network (TAGCN) [117] GraphDDoS [86] to aggregate neighbors from different hops instead of the direct neighborhood used in traditional GCNs. All embeddings are then reduced with max-pooling and fed into a fully-connected layer for graph classification.…”
Section: Code-basedmentioning
confidence: 99%
“…Network flows also provide useful information to detect DDoS attacks. In the paper [86], GraphD-DoS aims to detect low-rate and high-rate DDoS attacks by considering the relationship between flows along with the relationship of packets from a single flow. First of all, an endpoint graph is constructed by dividing packets into two groups based on the source and destination IP addresses.…”
Section: Network Flowmentioning
confidence: 99%
“…The latter involves statistical methods [9,58] and deep learning-based ones [1,5]. Early deep learning studies model the traffic as independent sequences [18,30,42,48]. Recent popular studies rely on GCN to aggregate traffic information [15,33,70].…”
Section: Related Work 21 Network Intrusion Detection Systemmentioning
confidence: 99%